This website uses cookies to ensure you have the best experience. Learn more

Is3440 Linux Security Lab 1 Essay

1514 words - 7 pages

Week 1 Lab

This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration.

Part # 1

Install a Core Linux Operating System on a Server
Learning Objectives and Outcomes
Upon completing this lab, students should know more about the following tasks:
* Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm
* Create secured partitions within the core Linux server for ...view middle of the document...

That way if there is an issue you will be able to accurately see when and what time something happened.
2. During the install, a password has been set for the “root” user. What is the “root” user, and when is it appropriate to use this account?
The root password in the Linux environment is the equivalent to the administer account in a windows computer. It should only be used when needed to run a specific command or do a specific job with in the server.
3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Window environment. Explain the purpose of this recommendation.
This would be because of performance issues along with security issues. A Linux machine can be set up very securely with or without X-Windows. With a production environment running the X-Windows it is another point of attack for an intruder.
4. During the installation process it asks what the options given to create the partition are? Name them.
/boot, /temp, /var, /swap, /home, /
5. Why is it important to partition a Linux system correctly?
It is important to partition system correctly otherwise you can run into memory errors down the road if one the directory’s run out of space.
6. What is the significance of the SWAP partition in a Linux system? What different ways can the swap space be configured, and why would you recommend one over the other?
When physical memory demand is sufficiently low, process memory images are brought back into physical memory from the swap area on disk.
7. What are some of the benefits and features that are available to Linux users by selecting the ext4 file system for the partitioning of a Linux system?
With the ex4 file system your able to get a larger file system with the same amount of space. It also increases the subdirectory limit from 32000 subdirectory’s to unlimited directory’s.
8. How is the passwd file used, and hat fields make up its content? Explain.
The passwd file can be used to either display information about users that may log in to the system or other operating system user identities that own running processes.

9. What is the fstab file used for and what fields make up its content? Explain.
The fstab file lists all available disks and disk partitions, and indicates how they are to be initialized or otherwise integrated into the overall system's file system. The fields that make up the fstab file contact are Device name, Mount point, filesystem, options, dump-freq and pass-num.

10. Explain the significance of creating separate partitions of the /var and /boot directories? What is contained within these directories?
It is important to separate these partitions due to performance and reliability concerns. With the /var file being used for the printing and email spooling. If you have a runaway process with one of these and if the /boot is not separated it could choke...

Other Papers Like Is3440 Linux Security Lab 1

Securing Linux Lab Assignment

2020 words - 9 pages Week 3 Lab This lab consists of two parts. Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon

Linux Essay

1010 words - 5 pages . www.wiki.debian.org/selinux; “Security Enhanced Linux”; website. 2. www.serverschool.com/dedicated-servers/what-is-a-chroot-jail/ ; “What is   Chroot Jail?”; website. 3. en.wikipedia.org/wiki/chroot ; “Chroot”; website. 4. www.ibm.com/developerworks/linux/library/s-netip/index.html ; “Introduction to Net Filter/Ip Tables”; website; Mugdha Vairagade; September 1, 2012. 5. www.nsa.gov/research/selinux/contrib.shtml ; National

Linux Introduction an Basics

1506 words - 7 pages /cdrom umount /mnt/cdrom ♦ EVERYTHING IS A FILE ► There are file handles for all hardware and software components Linux directory structure File types and security ♦ There are several file types that are available under Linux and supported by Linux file systems ♦ Default file security ► umask ♦ Setuid/setgid ► passwd is a good example Literature ♦ Reading ► Pro Linux System Administration • Chapter 1 – Introducing Linux • Chapter 3 – Linux Basics

Nt2580 Unit 1

3775 words - 16 pages NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform

Information Systems Security

4584 words - 19 pages Fundamentals of Information Systems Security 1E REVISED 38351_FMxx_ttlcp.indd 1 8/1/12 1:00 PM 38351_FMxx_ttlcp.indd 2 8/1/12 1:00 PM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 ASSESSMENT WORKSHEET LAB #2 Perform a

Computer Oss Comparison Essay

1900 words - 8 pages for SMP machines” (Santhanam, 2003). These changes are what moved Linux from being just a UNIX OS for PC to a viable business operating system. Linux kernel version 2.6, which was released in December 2003, introduced the SELinux security extension, which improved the performance of this OS on the higher end machines by cleaning up the kernel codebase to allow newer feature to be integrated into the kernel such as virtualization and

Blank

258 words - 2 pages © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date

Linux Security Technologies

1229 words - 5 pages -tip-how-set-a-chroot-jail National Security Agency Central Security Service. (2009, January 15). Retrieved from NSA: http://www.nsa.gov/research/selinux/docs.shtml Perrin, C. (2005, December 15). Linux 101:Configuring and managing iptables to improve network security. Retrieved from Tech Republic: http://www.techrepublic.com/article/linux-101-configuring-and-managing-iptables-to-improve-network-security/5997057 Vairagade, M. (2002, September 1). IBM. Retrieved from developer Works: http://www.ibm.com/developerworks/linux/library/s-netip/index.html

Nt1110 Module 1 Lab

1269 words - 6 pages frequently compared to other operating systems – further enhancing their stability and security. Linux operating systems are perhaps the most widely ported – there are distributions used in a wide range of devices from smartphones to TiVo. Differences 1. Windows - Pros - Compatibility: Almost every application, driver or game will work on Windows. Technical support: Having so many users, you can always find someone (either online or offline

Course Project

1993 words - 8 pages Linux PC. Step 1: Add network and host routes Action: Enter the command sequence as below. Result Routes for LAN IPs were added. Task 10 Verify that you can communicate with host12 and create output for a Lab Report document Step 1: Verify your configuration using ping Action Ping the IP address of other Linux PC at 192.168.240.12. Then ping it again using its fully qualified domain name (FQDN) as shown below

Itt 255 Lab 6

3922 words - 16 pages ITT Technical Institute NT2580 Introduction to Information Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1330 Client-Server Networking II or equivalent, NT1430 Linux Networking or equivalent Course Description: This course provides an overview of security challenges and strategies of counter measures in the

Related Essays

Is3440 Unit 1 Lab Assessment Sheet

503 words - 3 pages Assessment Worksheet Installing a Core Linux Operating System on a Server IS3440 - Linux Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview The

Securing A Linux Server Essay

571 words - 3 pages Erik Thompson IS3440 21 Sep 2015 Unit 1 Discussion 1 Securing a Linux System As the significant prevalence of Linux web servers globally grows, security is often touted as strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various

Construct A Linux Host Firewall And Monitor For Ip Traffic

665 words - 3 pages running on the Linux desktop. By defining what IP traffic is allowed and what IP traffic is denied, you implemented another layer of security in your overall layered security strategy. In addition, you explored some useful network management and security operation tools, which can be enabled to monitor your IP traffic and security functions. Lab Assessment Questions & Answers 1. Briefly explain how the Gufw internal Ubuntu host IP stateful

Common Lab Tasks Essay

2403 words - 10 pages . www.jblearning.com Page 8 Common Lab Tasks Figure 11 Disconnect a remote Linux connection  To close a Windows machine: 1. Right-click the Windows Start icon to open a context menu. 2. Click Shut down or sign out and select Sign Out on the menu. Note: On older operating systems, click Start > Log Off administrator. Figure 12 Logging off the remote Windows desktops 3. If prompted, Click OK to confirm your intention to disconnect the